Removal of all unauthorized access paths in production software
Information Management & Computer Security
ISSN: 0968-5227
Article publication date: 1 December 1996
Abstract
Presents a policy considered necessary to prevent breaches of security when software is moved from development to production. Contends that although information is a valuable, global commodity it is often unprotected. Presents suggestions to prevent encryption code from being broken. Gives guidelines for the security of encryption keys. Looks at the costs and benefits of encryption, packet encryption and the Internet. Discusses US policy, the US Computer Security Act and the US government proposals for information security
Keywords
Citation
Cresson Wood, C. (1996), "Removal of all unauthorized access paths in production software", Information Management & Computer Security, Vol. 4 No. 5, pp. 22-23. https://doi.org/10.1108/09685229610153148
Publisher
:MCB UP Ltd
Copyright © 1996, Company